DebugBreakpoint
DllCanUnloadNow
DllGetClassObject
Service
SpawnAndStart
Start
Uninstall
Static task
static1
Behavioral task
behavioral1
Sample
a2292aa0e6c60a189acc1e693f8ff7da_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a2292aa0e6c60a189acc1e693f8ff7da_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
a2292aa0e6c60a189acc1e693f8ff7da_JaffaCakes118
Size
151KB
MD5
a2292aa0e6c60a189acc1e693f8ff7da
SHA1
a345f346d9e48958ccffd061f75d9751fce07567
SHA256
c72d5f5706a999d9b25b08d787a239194fc63f6327f77ed6fff3688689415b63
SHA512
86c399ca149b85299ae257ee3f1b7ba3ee74979e23dbc8d22464cf5bd177c7c2e94fad50ae8fbbea47059212c6f687a6059dcd36ca12f69edda3b83dcea8c2f2
SSDEEP
3072:xOG77lItJesghXMa8EnkwjBtpBvZWhv64MnCnrnynhn8fO39V7xU95v+3mp7sNs/:baMXM1EBfBhOvzMnCnrnynhn84xos3m5
Checks for missing Authenticode signature.
resource |
---|
a2292aa0e6c60a189acc1e693f8ff7da_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
OpenEventA
ReadFile
ReleaseMutex
SetEndOfFile
SetEvent
SetFilePointer
SetFileTime
SystemTimeToFileTime
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnmapViewOfFile
WaitForMultipleObjects
WaitForSingleObject
WideCharToMultiByte
WriteFile
CreateThread
ExitThread
FreeLibrary
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
GlobalLock
GlobalUnlock
HeapAlloc
IsBadReadPtr
ResetEvent
SetErrorMode
MapViewOfFile
HeapSize
GetEnvironmentVariableA
GetLocalTime
GetLocaleInfoA
GetWindowsDirectoryA
FileTimeToSystemTime
GetCurrentProcess
GetDiskFreeSpaceA
GetDriveTypeA
GetFileTime
GetLogicalDrives
SetFileAttributesA
CreatePipe
DuplicateHandle
GetExitCodeProcess
PeekNamedPipe
ResumeThread
TerminateProcess
TerminateThread
lstrcmpiA
MultiByteToWideChar
FormatMessageA
GetFileType
GetPrivateProfileSectionA
MoveFileA
VirtualAlloc
VirtualFree
WritePrivateProfileSectionA
LoadLibraryA
HeapFree
HeapDestroy
HeapCreate
GetVolumeInformationA
CloseHandle
GetVersion
GetTimeZoneInformation
GetTempPathA
GetSystemTime
GetSystemDirectoryA
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetLastError
GetFileSize
FindNextFileA
FindFirstFileA
FindClose
DeleteFileA
CreateProcessA
CreateMutexA
CreateFileMappingA
CreateFileA
CreateEventA
HeapReAlloc
GetUserNameA
RegEnumKeyExA
RegDeleteValueA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegCreateKeyExA
RegCloseKey
GetActiveWindow
GetClassNameA
GetClipboardData
GetMessageTime
GetParent
GetWindowThreadProcessId
IsClipboardFormatAvailable
MsgWaitForMultipleObjects
OpenClipboard
PeekMessageA
PostMessageA
RegisterClassA
SendMessageTimeoutA
DefWindowProcA
TranslateMessage
EnumWindows
UnregisterClassA
ExitWindowsEx
CharToOemBuffA
OemToCharBuffA
GetClientRect
SetWindowLongA
MoveWindow
SystemParametersInfoA
GetWindowLongA
LoadCursorA
DestroyWindow
CreateWindowExA
CloseClipboard
CallNextHookEx
PostThreadMessageA
UnhookWindowsHookEx
DispatchMessageA
MessageBoxA
SetWindowsHookExA
inet_addr
shutdown
gethostname
WSAAsyncSelect
WSAGetLastError
bind
connect
inet_ntoa
listen
recv
send
getsockname
ioctlsocket
closesocket
accept
WSAStartup
WSAAsyncGetHostByAddr
WSAAsyncGetHostByName
WSACancelAsyncRequest
WSACleanup
socket
UuidCreate
ShellExecuteA
CoCreateInstance
OleUninitialize
StringFromGUID2
OleInitialize
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayGetUBound
SafeArrayGetLBound
DebugBreakpoint
DllCanUnloadNow
DllGetClassObject
Service
SpawnAndStart
Start
Uninstall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ